6. You can see the IP address of an iOS device by going
to Settings > General > Network > Wi-Fi > SSID Name > IP
7. iTunes is a media player and media library application
developed by Apple Inc. It is used to play, download, and
organize digital audio and video on personal computers running
the OS X operating system and the iOS-based iPod, iPhone,
and iPad devices, with editions also released for Microsoft
8. iCloud is a cloud storage and cloud computing service
from Apple Inc. The service allows users to store data such
as music and iOS applications on remote computer servers
for download to multiple devices such as iOS-based devices
running iOS 5 or later, and personal computers running OS
X 10.7.2 "Lion" or later, or Microsoft Windows (Windows
Vista service pack 2 or later).
9. Gyroscope enables re-alignment of screen orientation
as the user turns his phone.
10. The Global Positioning System (GPS) is a space-based
satellite navigation system that provides location and time
information in all weather conditions, anywhere on or near
the Earth where there is an unobstructed line of sight to
four or more GPS satellites. Most smart phones have GPS
built in to the software.
3.2 Establish basic network connectivity
and configure email
1. Bluetooth is widely used for communication between
smart phones and other accessories or between PDAs and information
kiosks. The typical coverage for Bluetooth devices is up
to 30 feet.Bluetooth devices, when in discoverable mode,
are able to be seen ( discovered ) by other bluetooth devices.
If two phones connect, the phone that is trying to establish
the initial connection, must be looking for a phone that
is "discoverable" otherwise it will not see it. Once the
connection is saved, discoverable mode is no longer necessary,
as the phones already know each other. This is only necessary
during an initial link.
2. The Wireless function key typically turns on / off
the wireless radio. If you inadvertantly press the function
key, it is possible that you are not able to access the
Internet, if using WiFi.
3. You need to know your domain name (e.g. example.com.au),
email address (e.g. firstname.lastname@example.org) and email account
password. You also need to know the POP or IMAP server name.
3.3 Compare and contrast methods
for securing mobile devices
1. A cable lock is the most inexpensive solution to secure
a laptop from theft. A cable lock just works the same way
a bicycle lock works. It physically secures the laptop to
a table or any other solid object that cannot be moved easily.
2. Setting passcodes on mobile devices is the most basic
security requirement for any mobile device to be allowed
into a work environment. Passcodes require the user to enter
a passphrase to unlock the device. Devices can also be configured
to lock automatically after a configurable timeout period.
(Typically, five minutes is ideal.)
3. Privacy screen or a privacy guard protects the sensitive
information on your screen while also protecting the screen
itself from scratches and damage. It is useful when travelling
or in public place in preventing prying eyes from seeing
what's on your laptop screen. And it's thin enough that
it still allows your laptop to close and latch.
4. A remote wipe removes all device-based data like mail,
calendar, and contacts from the device, but it may not delete
data stored on the device's SD card. Use this feature when
a device is lost or stolen to erase all data on the device
and reset the device.